Searching for the Stego-Key aJessica (original) (raw)
Related papers
Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Forensic steganalysis: determining the stego key in spatial domain steganography
Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Steganalysis of block-structured stegotext
Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Steganalysis: Detecting LSB Steganographic Techniques
An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 2016
Combining Steganography and Cryptography: New Directions
Quantitative steganalysis of digital images: estimating the secret message length
Multimedia Systems, 2003
CRYPTO-STEG: A Hybrid Cryptology-Steganography Approach for Improved Data Security
Analysis of Different Steganographic Algorithms for Secured Data Hiding
Implementation of Least Significant Bit Steganography and statistical steganalysis
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology - CCSEIT '12, 2012
Investigation of Steganalysis Algorithms for multiple Cover Media
Steganography and Steganalysis: different approaches
International …, 2008
IOSR Journal of Computer Engineering, 2012
Critical Analysis of Digital Steganography
Handbook of Research on Secure Multimedia Distribution
DATA SECURITY THROUGH CRYPTO-STEGANO SYSTEMS
The International Journal of Computational Science. Information Technology and Control Engineering. (IJCSITCE). , 2023
IOSR Journal of Computer Engineering, 2012
Steganalysis: The investigation of hidden information
Information Technology Conference, …, 1998
Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)
Steganography and Steganalysis: Different Approaches for Information Hiding
2013
PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
2007
Steganography and its Application
Journal of Steganography and its Application, 2019
Information Hiding: Steganography and Steganalysis
Handbook of Statistics, 2005
IJERT-A Review on Image Steganalysis techniques for attacking Steganography
International Journal of Engineering Research and Technology (IJERT), 2014
Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain
Symmetry
Stegocrypto -A Review Of Steganography Techniques Using Cryptography